๐Ÿ” CVE Alert

CVE-2026-41885

MEDIUM 6.5

Path traversal / URL injection via unsanitised lng/ns/projectId/version in i18next-locize-backend

CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
0th

i18next-locize-backend is a simple i18next backend for locize.com which can be used in Node.js, in the browser and for Deno. Prior to version 9.0.2, i18next-locize-backend interpolates lng, ns, projectId, and version directly into the configured loadPath / privatePath / addPath / updatePath / getLanguagesPath URL templates with no path-component validation and no encoding. When an application exposes any of these values to user-controlled input (?lng= / ?ns= query parameters via i18next-browser-languagedetector, cookies, request headers, or a URL-derived projectId), a crafted value can change the structure of the outgoing request URL. Affected call sites in lib/index.js (pre-patch): the interpolate() helper is used at the five URL-build sites โ€” _readAny/read (line 415 for private, 426 for public), getLanguages (lines 271 and 296), and writePage (lines 616 and 622) for the missing-key and update POST paths. The helper interpolate in lib/utils.js substitutes raw values with no encoding. This issue has been patched in version 9.0.2.

CWE CWE-22 CWE-74
Vendor locize
Product i18next-locize-backend
Published May 8, 2026
Last Updated May 8, 2026
Stay Ahead of the Next One

Get instant alerts for locize i18next-locize-backend

Be the first to know when new medium vulnerabilities affecting locize i18next-locize-backend are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None

Affected Versions

locize / i18next-locize-backend
< 9.0.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/locize/i18next-locize-backend/security/advisories/GHSA-mgcp-mfp8-3q45